Spammer and hacker, two old friends
Access Status
Authors
Date
2009Type
Metadata
Show full item recordCitation
Source Title
Source Conference
ISBN
Faculty
School
Remarks
Copyright © 2009 IEEE This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.
Collection
Abstract
Spammers are always looking for new ways to bypass filters and spread spam content. Currently, spammers have not only improved their spam methods but have also moved towards exploiting software security vulnerabilities in order to spread their spam content. Spammers use weaknesses inside web applications to inject their spam content into legitimate websites, redirect users to their own campaign, misuse web users resources, and hide their footprints. In this paper, we investigate security vulnerabilities that are exploited by spammers. We explain these security vulnerabilities, list their importance and provide a scenario of how spammers can exploit them. Additionally, we discuss two possible solutions to counter problems by patching and secure software development. The result of our work highlights importance of concerning security best-practices in developing secure software which lack of that would result to demotion of website popularity, blacklisting of website and lose of users' trust.
Related items
Showing items related by title, author, creator and subject.
-
Goh, Kwang Leng (2013)Web spamming has tremendously subverted the ranking mechanism of information retrieval in Web search engines. It manipulates data source maliciously either by contents or links with the intention of contributing negative ...
-
Potdar, Vidyasagar; Ridzuan, Farida; Singh, Jaipal (2012)In this paper, we provide a high level overview of Spam 2.0, how it works, its impacts and its categorizations (which are annoying, tricky, deceiving and evil). We also describe the existing approaches taken to combat ...
-
Hayati, P.; Firoozeh, N.; Potdar, Vidyasagar; Chai, K. (2012)Despite years of researcher’s contribution in the domain of spam filtering, the question as to how much money spammers can make has largely remained unanswered. The value of spam-marketing on the web can be determined by ...